Lots of panic: disabled syscall error

295 views
Skip to first unread message

Hangbin Liu

unread,
Apr 22, 2021, 2:35:59 AM4/22/21
to Dmitry Vyukov, syzkaller
Hi Dmitry,

This week I got a lot failures with error "panic: disabled syscall".
From the log there are some call traces that caused by failed sock_alloc().
I'm not sure if these two issues are related. Do you know if there are any
recent syzkaller update may affect this?

Here is an example error output:

[ 131.534570] FAULT_INJECTION: forcing a failure.
[ 131.534570] name failslab, interval 1, probability 0, space 0, times 0
[ 131.536450] CPU: 0 PID: 10847 Comm: syz-executor.2 Tainted: G ---------r- - 4.18.0-xxx
[ 131.538577] Hardware name: Red Hat KVM, BIOS 1.13.0-2.module+el8.3.0+7353+9de0a3cc 04/01/2014
[ 131.540035] Call Trace:
[ 131.540624] dump_stack+0xeb/0x14e
[ 131.541276] should_fail.cold.5+0xa/0x2a
[ 131.542004] ? lock_downgrade+0x710/0x710
[ 131.542725] ? fault_create_debugfs_attr+0x1d0/0x1d0
[ 131.543617] ? security_compute_sid+0x127/0x190
[ 131.544453] ? sock_alloc_inode+0x1d/0x240
[ 131.545185] __should_failslab+0x150/0x1ab
[ 131.545922] should_failslab+0xa/0x20
[ 131.546582] slab_pre_alloc_hook.constprop.48+0xa8/0xd0
[ 131.547511] ? sockfs_dname+0x80/0x80
[ 131.548175] ? sock_alloc_inode+0x1d/0x240
[ 131.548906] kmem_cache_alloc+0x48/0x300
[ 131.549612] ? selinux_mmap_file+0x220/0x220
[ 131.550379] ? sockfs_dname+0x80/0x80
[ 131.551059] sock_alloc_inode+0x1d/0x240
[ 131.551767] ? sockfs_dname+0x80/0x80
[ 131.552436] alloc_inode+0x63/0x180
[ 131.553080] new_inode_pseudo+0x17/0xe0
[ 131.553770] sock_alloc+0x41/0x310
[ 131.554401] __sock_create+0xc3/0x810
[ 131.555108] __sys_socket+0xf1/0x1f0
[ 131.555748] ? move_addr_to_kernel+0x70/0x70
[ 131.556533] ? do_syscall_64+0x3d/0x5d0
[ 131.557248] __x64_sys_socket+0x74/0xb0
[ 131.557962] do_syscall_64+0xe5/0x5d0
[ 131.558639] entry_SYSCALL_64_after_hwframe+0x6a/0xdf
[ 131.559533] RIP: 0033:0x47442d
[ 131.560101] Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b4 ff ff ff f7 d8 64 89 01 48
[ 131.563373] RSP: 002b:00007ff119b90118 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
[ 131.564647] RAX: ffffffffffffffda RBX: 000000000077bf60 RCX: 000000000047442d
[ 131.565839] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000002
[ 131.567029] RBP: 00007ff119b90150 R08: 0000000000000000 R09: 0000000000000000
[ 131.568220] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000077bf6c
[ 131.569409] R13: 0000000000cafb3f R14: 000000000077bf60 R15: 00007ff119b90280
[ 131.572494] socket: no more sockets

[..snip..]

01:07:51 executing program 8:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x5421, &(0x7f00000000c0)={'tunl0\x00'})
r1 = socket$nl_route(0x10, 0x3, 0x0)
accept(r1, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0x80)
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'nr0\x00'})
bind$netlink(r2, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x4000000}, 0xc)

executing disabled syscall setsockopt$inet6_udp_int
panic: disabled syscall


--------------- some other panic errors ----------------------

06:45:48 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
bind$netlink(r0, &(0x7f0000000080), 0xc)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000000)=""/62, &(0x7f0000000040)=0x3e)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
bind$netlink(r2, &(0x7f0000000140), 0xc)

executing disabled syscall setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS
panic: disabled syscall

01:56:03 executing program 9:
r0 = socket$packet(0x11, 0x2, 0x300)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'dummy0\x00', <r1=>0x0})
setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6, @random="20c834862845"}, 0x10)

[ 171.519432] device dummy0 entered promiscuous mode
[ 171.531163] device dummy0 left promiscuous mode
executing disabled syscall setsockopt$packet_tx_ring
panic: disabled syscall


Thanks
Hangbin

Dmitry Vyukov

unread,
Apr 22, 2021, 2:53:21 AM4/22/21
to Hangbin Liu, syzkaller
On Thu, Apr 22, 2021 at 8:36 AM Hangbin Liu <liuha...@gmail.com> wrote:
>
> Hi Dmitry,
>
> This week I got a lot failures with error "panic: disabled syscall".
> From the log there are some call traces that caused by failed sock_alloc().
> I'm not sure if these two issues are related. Do you know if there are any
> recent syzkaller update may affect this?

Hi Hangbin,

I can't think of any recent related changes.
This has been happening with very low rate on syzbot since the check
was added. I looked at the code several times, but I couldn't figure
out how/why this is happening. Disabled syscalls are not generated,
should not be inserted during mutation and are filtered out when
programs are received from e.g. syz-hub.
> --
> You received this message because you are subscribed to the Google Groups "syzkaller" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller+...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller/20210422063548.GB3465%40Leo-laptop-t470s.

Hangbin Liu

unread,
Apr 22, 2021, 5:00:43 AM4/22/21
to Dmitry Vyukov, syzkaller
On Thu, Apr 22, 2021 at 08:53:07AM +0200, Dmitry Vyukov wrote:
> On Thu, Apr 22, 2021 at 8:36 AM Hangbin Liu <liuha...@gmail.com> wrote:
> >
> > Hi Dmitry,
> >
> > This week I got a lot failures with error "panic: disabled syscall".
> > From the log there are some call traces that caused by failed sock_alloc().
> > I'm not sure if these two issues are related. Do you know if there are any
> > recent syzkaller update may affect this?
>
> Hi Hangbin,
>
> I can't think of any recent related changes.
> This has been happening with very low rate on syzbot since the check
> was added. I looked at the code several times, but I couldn't figure
> out how/why this is happening. Disabled syscalls are not generated,
> should not be inserted during mutation and are filtered out when
> programs are received from e.g. syz-hub.

I haven't seen this issue in last week's testing. But this week half of
the networking tests got this error. It looks there may have some false
positive reports. e.g. in packet testing. I have config like

# 'cat syzkaller-test.cfg'
{
"http": "0.0.0.0:56741",
"rpc": "127.0.0.1:0",
"sshkey" : "/root/.ssh/id_rsa",
"procs" : 16,
"workdir": "/mnt/tests/kernel/networking/syzkaller/virtual/syz-manager-logs",
"enable_syscalls" : [
"getgid", "getpid", "getuid", "clock_gettime", "socket$inet", "socket$inet6", "socket$nl_route", "socket$nl_generic", "bind$netlink", "accept", "accept$inet", "accept$inet6", "ioctl$sock_SIOCGIFINDEX", "bpf$MAP_CREATE", "socket$packet", "bind$packet", "connect$packet", "accept$packet", "accept4$packet", "sendto$packet", "recvfrom$packet", "getsockname$packet", "getpeername$packet", "getsockopt$packet_int", "setsockopt$packet_int", "getsockopt$packet_buf", "setsockopt$packet_buf", "setsockopt$packet_add_memb", "setsockopt$packet_drop_memb", "setsockopt$packet_rx_ring", "setsockopt$packet_tx_ring", "setsockopt$packet_fanout", "setsockopt$packet_fanout_data"
],
"target": "linux/amd64",
"kernel_obj": "/mnt/tests/kernel/networking/syzkaller/virtual",
"syzkaller": "/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/",
"sandbox": "namespace",
"cover": true,
"reproduce": true,
"image": "/home/stand_el8.x86_64.qcow2",
"type": "qemu",
"vm": {
"count": 8, "cpu": 2, "mem": 2048
}
}

The output of syz-manager shows packet_tx_ring was not disables:

2021/04/19 01:52:49 loading corpus...
2021/04/19 01:52:49 serving http on http://0.0.0.0:56741
2021/04/19 01:52:49 serving rpc on tcp://127.0.0.1:42977
2021/04/19 01:52:49 booting test machines...
2021/04/19 01:52:49 wait for the connection from test machine...
2021/04/19 01:54:01 disabling accept$ipx: no syscalls can create resource sock_ipx, enable some syscalls that can create it [accept$ipx accept4$ipx socket$ipx]
2021/04/19 01:54:01 disabling accept$phonet_pipe: no syscalls can create resource sock_phonet_pipe, enable some syscalls that can create it [accept$phonet_pipe accept4$phonet_pipe socket$phonet_pipe]
2021/04/19 01:54:01 disabling accept$unix: no syscalls can create resource sock_unix, enable some syscalls that can create it [accept$unix accept4$unix socket$unix socketpair$unix]
2021/04/19 01:54:01 disabling accept$netrom: no syscalls can create resource sock_netrom, enable some syscalls that can create it [accept$netrom accept4$netrom syz_init_net_socket$netrom]
2021/04/19 01:54:01 disabling accept$alg: no syscalls can create resource sock_alg, enable some syscalls that can create it [socket$alg]
2021/04/19 01:54:01 disabling accept$ax25: no syscalls can create resource sock_ax25, enable some syscalls that can create it [accept$ax25 accept4$ax25 syz_init_net_socket$ax25]
2021/04/19 01:54:01 disabling accept$nfc_llcp: no syscalls can create resource sock_nfc_llcp, enable some syscalls that can create it [accept$nfc_llcp accept4$nfc_llcp syz_init_net_socket$nfc_llcp]
2021/04/19 01:54:01 machine check:
2021/04/19 01:54:01 syscalls : 33/4124
2021/04/19 01:54:01 code coverage : enabled
2021/04/19 01:54:01 comparison tracing : enabled
2021/04/19 01:54:01 extra coverage : enabled
2021/04/19 01:54:01 setuid sandbox : enabled
2021/04/19 01:54:01 namespace sandbox : enabled
2021/04/19 01:54:01 Android sandbox : enabled
2021/04/19 01:54:01 fault injection : enabled
2021/04/19 01:54:01 leak checking : KMEMLEAK disabled: increase CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE or unset CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF
2021/04/19 01:54:01 net packet injection : enabled
2021/04/19 01:54:01 net device setup : enabled
2021/04/19 01:54:01 concurrency sanitizer : /sys/kernel/debug/kcsan does not exist
2021/04/19 01:54:01 devlink PCI setup : PCI device 0000:00:10.0 is not available
2021/04/19 01:54:01 USB emulation : /dev/raw-gadget does not exist
2021/04/19 01:54:01 hci packet injection : enabled
2021/04/19 01:54:01 wifi device emulation : /sys/class/mac80211_hwsim/ does not exist
2021/04/19 01:54:01 802.15.4 emulation : /sys/bus/platform/devices/mac802154_hwsim does not exist
2021/04/19 01:54:01 corpus : 0 (deleted 0 broken)
2021/04/19 01:54:03 seeds : 0/683
2021/04/19 01:54:09 VMs 2, executed 11, cover 0, signal 0/0, crashes 0, repro 0
2021/04/19 01:54:19 VMs 3, executed 38, cover 0, signal 0/0, crashes 0, repro 0
2021/04/19 01:54:29 VMs 4, executed 245, cover 716, signal 3/3363, crashes 0, repro 0
[...]

But the error logs shows:

Dmitry Vyukov

unread,
Apr 22, 2021, 9:02:57 AM4/22/21
to Hangbin Liu, syzkaller
I can reproduce up to this point, but I am not getting any "executing
disabled syscall".

When we handle disabled syscalls we copy data multiple times from maps
to arrays and back, in some cases we use indexes, in some cases we use
names, so potentially we mess things up somewhere. But if it's the
case, I would expect such crashes to happen always, in very high
numbers and easily reproducible.
> --
> You received this message because you are subscribed to the Google Groups "syzkaller" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller+...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller/20210422090032.GC3465%40Leo-laptop-t470s.

Hangbin Liu

unread,
Apr 22, 2021, 10:19:19 AM4/22/21
to Dmitry Vyukov, syzkaller
On Thu, Apr 22, 2021 at 03:02:43PM +0200, Dmitry Vyukov wrote:
> I can reproduce up to this point, but I am not getting any "executing
> disabled syscall".
>
> When we handle disabled syscalls we copy data multiple times from maps
> to arrays and back, in some cases we use indexes, in some cases we use
> names, so potentially we mess things up somewhere. But if it's the
> case, I would expect such crashes to happen always, in very high
> numbers and easily reproducible.

Not sure why I started to got this issue this week. Let's see if I still
have the same issue next week.

Thanks
Hangbin

Dmitry Vyukov

unread,
Apr 22, 2021, 10:22:34 AM4/22/21
to Hangbin Liu, syzkaller
If you can reproduce it at least during fuzzing within an hour,
perhaps you could extend logging on that error to print as much
relevant info as possible, maybe also some additional info on
syz-manager start/check connection. As you noted, there is some
mismatch, so maybe that additional info will shed some light.

Hangbin Liu

unread,
Apr 22, 2021, 10:02:14 PM4/22/21
to Dmitry Vyukov, syzkaller
Hi Dmitry,

Would you like to give me a test patch so I can try it?

Thanks
Hangbin

Dmitry Vyukov

unread,
Apr 26, 2021, 4:22:28 AM4/26/21
to Hangbin Liu, syzkaller
Here is a patch that can shed some light on where things go wrong:
https://github.com/google/syzkaller/pull/2558

Hangbin Liu

unread,
Apr 26, 2021, 4:55:35 AM4/26/21
to Dmitry Vyukov, syzkaller
On Mon, Apr 26, 2021 at 10:22:15AM +0200, Dmitry Vyukov wrote:
> > Hi Dmitry,
> >
> > Would you like to give me a test patch so I can try it?
>
> Here is a patch that can shed some light on where things go wrong:
> https://github.com/google/syzkaller/pull/2558

Thanks, I will resubmit the jobs and see if we can find a reason.

Cheers
Hangbin

Hangbin Liu

unread,
Apr 30, 2021, 2:24:03 AM4/30/21
to Dmitry Vyukov, syzkaller
On Mon, Apr 26, 2021 at 10:22:15AM +0200, Dmitry Vyukov wrote:
> Here is a patch that can shed some light on where things go wrong:
> https://github.com/google/syzkaller/pull/2558

Hi Dmitry,

FYI, I submitted about 30 jobs this week but can't reproduce it now...
Not sure why, but I will keep an eye on it and send you the result when
I can reproduce it again.

Thanks
Hangbin

Hangbin Liu

unread,
May 10, 2021, 12:11:25 AM5/10/21
to Dmitry Vyukov, syzkaller
On Mon, Apr 26, 2021 at 10:22:15AM +0200, Dmitry Vyukov wrote:
> Here is a patch that can shed some light on where things go wrong:
> https://github.com/google/syzkaller/pull/2558

Hi Dmitry,

I reproduced the issue today with bpf test. I have attached the later part of
the log as the full log is too long.

Here is the config file

{
"http": "0.0.0.0:56741",
"rpc": "127.0.0.1:0",
"sshkey" : "/root/.ssh/id_rsa",
"procs" : 16,
"workdir": "/tests/syzkaller/virtual/syz-manager-logs",
"enable_syscalls" : [
"getgid", "getpid", "getuid", "clock_gettime", "socket$inet", "socket$inet6", "socket$nl_route", "socket$nl_generic", "bind$netlink", "accept", "accept$inet", "accept$inet6", "ioctl$sock_SIOCGIFINDEX", "bpf$MAP_CREATE", "bpf$MAP_CREATE", "bpf$MAP_LOOKUP_ELEM", "bpf$MAP_UPDATE_ELEM", "bpf$MAP_DELETE_ELEM", "bpf$MAP_GET_NEXT_KEY", "bpf$PROG_LOAD", "bpf$OBJ_PIN_MAP", "bpf$OBJ_PIN_PROG", "bpf$OBJ_GET_MAP", "bpf$OBJ_GET_PROG", "bpf$BPF_PROG_ATTACH", "bpf$BPF_PROG_DETACH", "bpf$BPF_PROG_TEST_RUN", "bpf$BPF_PROG_GET_NEXT_ID", "bpf$BPF_MAP_GET_NEXT_ID", "bpf$BPF_BTF_GET_NEXT_ID", "bpf$BPF_PROG_GET_FD_BY_ID", "bpf$BPF_MAP_GET_FD_BY_ID", "bpf$BPF_GET_PROG_INFO", "bpf$BPF_GET_MAP_INFO", "bpf$BPF_GET_BTF_INFO", "bpf$BPF_PROG_QUERY", "bpf$BPF_BTF_LOAD", "bpf$BPF_BTF_GET_FD_BY_ID", "bpf$BPF_TASK_FD_QUERY", "bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM", "bpf$BPF_MAP_FREEZE", "bpf$MAP_LOOKUP_BATCH", "bpf$MAP_UPDATE_BATCH", "bpf$MAP_DELETE_BATCH", "bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH", "bpf$BPF_LINK_CREATE", "bpf$BPF_LINK_UPDATE", "bpf$ENABLE_STATS", "bpf$ITER_CREATE", "bpf$LINK_GET_FD_BY_ID", "bpf$LINK_GET_NEXT_ID", "bpf$LINK_DETACH", "bpf$PROG_BIND_MAP"
],
"target": "linux/amd64",
"kernel_obj": "/tests/syzkaller/virtual",
"syzkaller": "/tests/syzkaller/virtual/gopath/src/github.com/google/syzkaller/",
"sandbox": "namespace",
"cover": true,
"reproduce": true,
"image": "/home/stand_el8.x86_64.qcow2",
"type": "qemu",
"vm": {
"count": 8, "cpu": 2, "mem": 2048
}
}

Here is part of the log:

executing disabled syscall bpf$MAP_LOOKUP_BATCH [111]
check result for sandbox=namespace:
socket$nl_route [3697]
getuid [520]
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM [90]
accept$inet6 [4]
accept [0]
bpf$OBJ_GET_MAP [115]
bpf$PROG_BIND_MAP [119]
bpf$BPF_BTF_GET_FD_BY_ID [78]
bpf$BPF_LINK_UPDATE [85]
bpf$LINK_GET_NEXT_ID [106]
clock_gettime [129]
bpf$BPF_BTF_GET_NEXT_ID [79]
getgid [264]
bpf$MAP_UPDATE_BATCH [113]
ioctl$sock_SIOCGIFINDEX [2135]
bpf$OBJ_GET_PROG [116]
getpid [283]
bpf$ENABLE_STATS [102]
accept$inet [3]
bind$netlink [62]
socket$inet6 [3666]
bpf$BPF_BTF_LOAD [80]
bpf$BPF_PROG_GET_NEXT_ID [94]
bpf$BPF_PROG_ATTACH [91]
bpf$MAP_DELETE_BATCH [108]
bpf$BPF_MAP_GET_FD_BY_ID [87]
bpf$BPF_MAP_FREEZE [86]
bpf$MAP_DELETE_ELEM [109]
bpf$BPF_GET_MAP_INFO [82]
bpf$PROG_LOAD [120]
socket$inet [3665]
bpf$LINK_GET_FD_BY_ID [105]
bpf$LINK_DETACH [104]
bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH [89]
bpf$OBJ_PIN_MAP [117]
bpf$BPF_PROG_GET_FD_BY_ID [93]
bpf$MAP_CREATE [107]
bpf$BPF_GET_PROG_INFO [83]
bpf$MAP_GET_NEXT_KEY [110]
bpf$ITER_CREATE [103]
socket$nl_generic [3694]
bpf$BPF_MAP_GET_NEXT_ID [88]
bpf$BPF_GET_BTF_INFO [81]
bpf$MAP_LOOKUP_ELEM [112]
bpf$OBJ_PIN_PROG [118]
choice table:
#0: accept [0]: enabled=true
#1: accept$alg [1]: enabled=false
#2: accept$ax25 [2]: enabled=false
#3: accept$inet [3]: enabled=true
#4: accept$inet6 [4]: enabled=true
#5: accept$ipx [5]: enabled=false
#6: accept$netrom [6]: enabled=false
#7: accept$nfc_llcp [7]: enabled=false
#8: accept$packet [8]: enabled=false
#9: accept$phonet_pipe [9]: enabled=false
#10: accept$unix [10]: enabled=false
#11: accept4 [11]: enabled=false
#12: accept4$alg [12]: enabled=false
[...snip...]
#4140: write$trusty_storage [4140]: enabled=false
#4141: write$tun [4141]: enabled=false
#4142: write$uinput_user_dev [4142]: enabled=false
#4143: write$usbip_server [4143]: enabled=false
#4144: write$vga_arbiter [4144]: enabled=false
#4145: write$vhost_msg [4145]: enabled=false
#4146: write$vhost_msg_v2 [4146]: enabled=false
#4147: writev [4147]: enabled=false
panic: disabled syscall

goroutine 14 [running]:
main.(*Proc).checkDisabledCalls(0xc000073040, 0xc0063f8a80)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:327 +0x654
main.(*Proc).executeRaw(0xc000073040, 0xc000292300, 0xc0063f8a80, 0x5, 0x0)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:283 +0x7e
main.(*Proc).execute(0xc000073040, 0xc000292300, 0xc0063f8a80, 0x0, 0x5, 0x1)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:251 +0x6a
main.(*Proc).smashInput(0xc000073040, 0xc0008995c0)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:215 +0x1d8
main.(*Proc).loop(0xc000073040)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:78 +0x1d7
created by main.main
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:295 +0x1527


Thanks
Hangbin
log

Dmitry Vyukov

unread,
May 10, 2021, 1:07:24 AM5/10/21
to Hangbin Liu, syzkaller
On Mon, May 10, 2021 at 6:11 AM Hangbin Liu <liuha...@gmail.com> wrote:
>
> On Mon, Apr 26, 2021 at 10:22:15AM +0200, Dmitry Vyukov wrote:
> > Here is a patch that can shed some light on where things go wrong:
> > https://github.com/google/syzkaller/pull/2558
>
> Hi Dmitry,
>
> I reproduced the issue today with bpf test. I have attached the later part of
> the log as the full log is too long.

Interesting.
PLease also show the start of manager log with "disabled syscalls" and
contents of the /syscalls manager page with the same config.
> --
> You received this message because you are subscribed to the Google Groups "syzkaller" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller+...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller/20210510041110.GZ3465%40Leo-laptop-t470s.

Hangbin Liu

unread,
May 10, 2021, 2:53:14 AM5/10/21
to Dmitry Vyukov, syzkaller
On Mon, May 10, 2021 at 07:07:11AM +0200, Dmitry Vyukov wrote:
> On Mon, May 10, 2021 at 6:11 AM Hangbin Liu <liuha...@gmail.com> wrote:
> >
> > On Mon, Apr 26, 2021 at 10:22:15AM +0200, Dmitry Vyukov wrote:
> > > Here is a patch that can shed some light on where things go wrong:
> > > https://github.com/google/syzkaller/pull/2558
> >
> > Hi Dmitry,
> >
> > I reproduced the issue today with bpf test. I have attached the later part of
> > the log as the full log is too long.
>
> Interesting.
> PLease also show the start of manager log with "disabled syscalls" and

2021/05/05 00:14:22 loading corpus...
2021/05/05 00:14:22 serving http on http://0.0.0.0:56741
2021/05/05 00:14:22 serving rpc on tcp://127.0.0.1:44087
2021/05/05 00:14:22 booting test machines...
2021/05/05 00:14:22 wait for the connection from test machine...
2021/05/05 00:15:35 disabling bpf$BPF_LINK_CREATE: no syscalls can create resource fd_cgroup, enable some syscalls that can create it [openat$cgroup openat$cgroup_root]
2021/05/05 00:15:35 disabling bpf$BPF_PROG_QUERY: no syscalls can create resource fd_cgroup, enable some syscalls that can create it [openat$cgroup openat$cgroup_root]
2021/05/05 00:15:35 disabling accept$netrom: no syscalls can create resource sock_netrom, enable some syscalls that can create it [accept$netrom accept4$netrom syz_init_net_socket$netrom]
2021/05/05 00:15:35 disabling accept$nfc_llcp: no syscalls can create resource sock_nfc_llcp, enable some syscalls that can create it [accept$nfc_llcp accept4$nfc_llcp syz_init_net_socket$nfc_llcp]
2021/05/05 00:15:35 disabling accept$ipx: no syscalls can create resource sock_ipx, enable some syscalls that can create it [accept$ipx accept4$ipx socket$ipx]
2021/05/05 00:15:35 disabling accept$alg: no syscalls can create resource sock_alg, enable some syscalls that can create it [socket$alg]
2021/05/05 00:15:35 disabling accept$packet: no syscalls can create resource sock_packet, enable some syscalls that can create it [accept$packet accept4$packet socket$packet]
2021/05/05 00:15:35 disabling accept$phonet_pipe: no syscalls can create resource sock_phonet_pipe, enable some syscalls that can create it [accept$phonet_pipe accept4$phonet_pipe socket$phonet_pipe]
2021/05/05 00:15:35 disabling bpf$MAP_UPDATE_ELEM: no syscalls can create resource sock_udp, enable some syscalls that can create it [socket$inet_udp socket$inet_udplite]
2021/05/05 00:15:35 disabling accept$ax25: no syscalls can create resource sock_ax25, enable some syscalls that can create it [accept$ax25 accept4$ax25 syz_init_net_socket$ax25]
2021/05/05 00:15:35 disabling accept$unix: no syscalls can create resource sock_unix, enable some syscalls that can create it [accept$unix accept4$unix socket$unix socketpair$unix]
2021/05/05 00:15:35 disabling bpf$BPF_TASK_FD_QUERY: no syscalls can create resource fd_perf_base, enable some syscalls that can create it [bpf$BPF_RAW_TRACEPOINT_OPEN bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED perf_event_open perf_event_open$cgroup]
2021/05/05 00:15:35 machine check:
2021/05/05 00:15:35 syscalls : 48/4148
2021/05/05 00:15:35 code coverage : enabled
2021/05/05 00:15:35 comparison tracing : enabled
2021/05/05 00:15:35 extra coverage : enabled
2021/05/05 00:15:35 setuid sandbox : enabled
2021/05/05 00:15:35 namespace sandbox : enabled
2021/05/05 00:15:35 Android sandbox : enabled
2021/05/05 00:15:35 fault injection : enabled
2021/05/05 00:15:35 leak checking : KMEMLEAK disabled: increase CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE or unset CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF
2021/05/05 00:15:35 net packet injection : enabled
2021/05/05 00:15:35 net device setup : enabled
2021/05/05 00:15:35 concurrency sanitizer : /sys/kernel/debug/kcsan does not exist
2021/05/05 00:15:35 devlink PCI setup : PCI device 0000:00:10.0 is not available
2021/05/05 00:15:35 USB emulation : /dev/raw-gadget does not exist
2021/05/05 00:15:35 hci packet injection : enabled
2021/05/05 00:15:35 wifi device emulation : /sys/class/mac80211_hwsim/ does not exist
2021/05/05 00:15:35 802.15.4 emulation : /sys/bus/platform/devices/mac802154_hwsim does not exist
2021/05/05 00:15:35 corpus : 0 (deleted 0 broken)
2021/05/05 00:15:37 seeds : 0/683
2021/05/05 00:15:42 VMs 2, executed 5, cover 0, signal 0/0, crashes 0, repro 0
2021/05/05 00:15:52 VMs 3, executed 34, cover 0, signal 0/0, crashes 0, repro 0
2021/05/05 00:16:02 VMs 4, executed 48, cover 141, signal 12/0, crashes 0, repro 0
2021/05/05 00:16:12 VMs 5, executed 492, cover 1598, signal 1486/3088, crashes 0, repro 0
2021/05/05 00:16:22 VMs 6, executed 1798, cover 2789, signal 3391/4694, crashes 0, repro 0
2021/05/05 00:16:32 VMs 7, executed 3027, cover 3111, signal 4209/5048, crashes 0, repro 0
[...]


> contents of the /syscalls manager page with the same config.

What's this?

Thanks
Hangbin

Dmitry Vyukov

unread,
May 10, 2021, 2:57:39 AM5/10/21
to Hangbin Liu, syzkaller
Contents of http://0.0.0.0:56741/syscalls , or if you click "syscalls"
in the manager web ui.

Hangbin Liu

unread,
May 10, 2021, 3:28:26 AM5/10/21
to Dmitry Vyukov, syzkaller
On Mon, May 10, 2021 at 08:57:26AM +0200, Dmitry Vyukov wrote:
> > > contents of the /syscalls manager page with the same config.
> >
> > What's this?
>
> Contents of http://0.0.0.0:56741/syscalls , or if you click "syscalls"
> in the manager web ui.

Ah, the test are automatized and the server has been released, I only saved the
syz-manager-logs (defined in "workdir") and corpus.db. Does corpus.db helps?

Thanks
Hangbin
corpus.db

Dmitry Vyukov

unread,
May 10, 2021, 6:57:45 AM5/10/21
to Hangbin Liu, syzkaller
I still have no clues.
Presumably the program was created by mutation. I stared at the code
more and I don't see how mutation can insert disabled syscalls.
I've also extended TestEnabledCalls and run it several thousand times.
I've created https://github.com/google/syzkaller/pull/2575 which may
or may not shed any light.

Hangbin Liu

unread,
May 10, 2021, 10:31:38 PM5/10/21
to Dmitry Vyukov, syzkaller
Thanks Dmitry, I will track it and report to you if trigger this issue again.

Hangbin

Hangbin Liu

unread,
May 16, 2021, 9:16:42 PM5/16/21
to Dmitry Vyukov, syzkaller
Hi Dmitry,

Here is last week's report, full log file attached. As the testing are automatic,
do you know how to get the /syscalls after testing?

# 'cat syzkaller-test.cfg'
{
"http": "0.0.0.0:56741",
"rpc": "127.0.0.1:0",
"sshkey" : "/root/.ssh/id_rsa",
"procs" : 16,
"workdir": "/mnt/tests/kernel/networking/syzkaller/virtual/syz-manager-logs",
"enable_syscalls" : [
"getgid", "getpid", "getuid", "clock_gettime", "socket$inet", "socket$inet6", "socket$nl_route", "socket$nl_generic", "bind$netlink", "accept", "accept$inet", "accept$inet6", "ioctl$sock_SIOCGIFINDEX", "bpf$MAP_CREATE", "socket$inet_sctp", "socket$inet6_sctp", "sendmsg$inet_sctp", "sendmmsg$inet_sctp", "setsockopt$inet_sctp_SCTP_RTOINFO", "setsockopt$inet_sctp6_SCTP_RTOINFO", "getsockopt$inet_sctp_SCTP_RTOINFO", "getsockopt$inet_sctp6_SCTP_RTOINFO", "setsockopt$inet_sctp_SCTP_ASSOCINFO", "setsockopt$inet_sctp6_SCTP_ASSOCINFO", "getsockopt$inet_sctp_SCTP_ASSOCINFO", "getsockopt$inet_sctp6_SCTP_ASSOCINFO", "setsockopt$inet_sctp_SCTP_INITMSG", "setsockopt$inet_sctp6_SCTP_INITMSG", "getsockopt$inet_sctp_SCTP_INITMSG", "getsockopt$inet_sctp6_SCTP_INITMSG", "setsockopt$inet_sctp_SCTP_NODELAY", "setsockopt$inet_sctp6_SCTP_NODELAY", "getsockopt$inet_sctp_SCTP_NODELAY", "getsockopt$inet_sctp6_SCTP_NODELAY", "setsockopt$inet_sctp_SCTP_AUTOCLOSE", "setsockopt$inet_sctp6_SCTP_AUTOCLOSE", "getsockopt$inet_sctp_SCTP_AUTOCLOSE", "getsockopt$inet_sctp6_SCTP_AUTOCLOSE", "setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR", "setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR", "setsockopt$inet_sctp_SCTP_PRIMARY_ADDR", "setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR", "getsockopt$inet_sctp_SCTP_PRIMARY_ADDR", "getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR", "setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER", "setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER", "getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER", "getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER", "setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS", "setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS", "getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS", "getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS", "setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS", "setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS", "getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS", "getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS", "setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM", "setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM", "getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM", "getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM", "setsockopt$inet_sctp_SCTP_EVENTS", "setsockopt$inet_sctp6_SCTP_EVENTS", "getsockopt$inet_sctp_SCTP_EVENTS", "getsockopt$inet_sctp6_SCTP_EVENTS", "setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR", "setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR", "getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR", "getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR", "setsockopt$inet_sctp_SCTP_MAXSEG", "setsockopt$inet_sctp6_SCTP_MAXSEG", "getsockopt$inet_sctp_SCTP_MAXSEG", "getsockopt$inet_sctp6_SCTP_MAXSEG", "getsockopt$inet_sctp_SCTP_STATUS", "getsockopt$inet_sctp6_SCTP_STATUS", "getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO", "getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO", "setsockopt$inet_sctp_SCTP_DELAYED_SACK", "setsockopt$inet_sctp6_SCTP_DELAYED_SACK", "getsockopt$inet_sctp_SCTP_DELAYED_SACK", "getsockopt$inet_sctp6_SCTP_DELAYED_SACK", "setsockopt$inet_sctp_SCTP_CONTEXT", "setsockopt$inet_sctp6_SCTP_CONTEXT", "getsockopt$inet_sctp_SCTP_CONTEXT", "getsockopt$inet_sctp6_SCTP_CONTEXT", "setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE", "setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE", "getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE", "getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE", "setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT", "setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT", "getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT", "getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT", "setsockopt$inet_sctp_SCTP_MAX_BURST", "setsockopt$inet_sctp6_SCTP_MAX_BURST", "getsockopt$inet_sctp_SCTP_MAX_BURST", "getsockopt$inet_sctp6_SCTP_MAX_BURST", "setsockopt$inet_sctp_SCTP_AUTH_CHUNK", "setsockopt$inet_sctp6_SCTP_AUTH_CHUNK", "setsockopt$inet_sctp_SCTP_HMAC_IDENT", "setsockopt$inet_sctp6_SCTP_HMAC_IDENT", "getsockopt$inet_sctp_SCTP_HMAC_IDENT", "getsockopt$inet_sctp6_SCTP_HMAC_IDENT", "setsockopt$inet_sctp_SCTP_AUTH_KEY", "setsockopt$inet_sctp6_SCTP_AUTH_KEY", "setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY", "setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY", "getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY", "getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY", "setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY", "setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY", "getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS", "getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS", "getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS", "getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS", "getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER", "getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER", "getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST", "getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST", "setsockopt$inet_sctp_SCTP_AUTO_ASCONF", "setsockopt$inet_sctp6_SCTP_AUTO_ASCONF", "getsockopt$inet_sctp_SCTP_AUTO_ASCONF", "getsockopt$inet_sctp6_SCTP_AUTO_ASCONF", "setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS", "setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS", "getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS", "getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS", "setsockopt$inet_sctp_SCTP_RECVRCVINFO", "setsockopt$inet_sctp6_SCTP_RECVRCVINFO", "getsockopt$inet_sctp_SCTP_RECVRCVINFO", "getsockopt$inet_sctp6_SCTP_RECVRCVINFO", "setsockopt$inet_sctp_SCTP_RECVNXTINFO", "setsockopt$inet_sctp6_SCTP_RECVNXTINFO", "getsockopt$inet_sctp_SCTP_RECVNXTINFO", "getsockopt$inet_sctp6_SCTP_RECVNXTINFO", "setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO", "setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO", "getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO", "getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO", "setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY", "setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY", "setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD", "setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD", "setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM", "setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM", "getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF", "getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF", "setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD", "setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD", "getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS", "getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS", "getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS", "getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS", "setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX", "setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX", "getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3", "getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3", "getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS", "getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS", "setsockopt$inet_sctp_SCTP_PR_SUPPORTED", "setsockopt$inet_sctp6_SCTP_PR_SUPPORTED", "getsockopt$inet_sctp_SCTP_PR_SUPPORTED", "getsockopt$inet_sctp6_SCTP_PR_SUPPORTED", "setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO", "setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO", "getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO", "getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO", "getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS", "getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS", "setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET", "setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET", "getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET", "getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET", "setsockopt$inet_sctp_SCTP_RESET_STREAMS", "setsockopt$inet_sctp6_SCTP_RESET_STREAMS", "getsockopt$inet_sctp_SCTP_RESET_STREAMS", "getsockopt$inet_sctp6_SCTP_RESET_STREAMS", "setsockopt$inet_sctp_SCTP_RESET_ASSOC", "setsockopt$inet_sctp6_SCTP_RESET_ASSOC", "setsockopt$inet_sctp_SCTP_ADD_STREAMS", "setsockopt$inet_sctp6_SCTP_ADD_STREAMS", "getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS", "getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS", "setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED", "setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED", "getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED", "getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED", "setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER", "setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER", "getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER", "getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER", "setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE", "setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE", "getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE", "getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE", "ioctl$sock_inet_sctp_SIOCINQ"
],
"target": "linux/amd64",
"kernel_obj": "/mnt/tests/kernel/networking/syzkaller/virtual",
"syzkaller": "/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/",
"sandbox": "namespace",
"cover": true,
"reproduce": true,
"image": "/home/stand_el8.x86_64.qcow2",
"type": "qemu",
"vm": {
"count": 8, "cpu": 2, "mem": 2048
}
}

2021/05/11 10:26:12 loading corpus...
2021/05/11 10:26:20 failed to deserialize database record: flate: corrupt input before offset 139
2021/05/11 10:26:20 serving http on http://0.0.0.0:56741
2021/05/11 10:26:20 serving rpc on tcp://127.0.0.1:43629
2021/05/11 10:26:20 booting test machines...
2021/05/11 10:26:20 wait for the connection from test machine...
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_AUTO_ASCONF: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_ADD_STREAMS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_NODELAY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_HMAC_IDENT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_CONTEXT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_RESET_STREAMS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_MAXSEG: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RESET_STREAMS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RESET_ASSOC: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling socket$inet6_sctp: protocol not supported
2021/05/11 10:27:58 disabling sendmmsg$inet_sctp: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_AUTOCLOSE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_RTOINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_MAX_BURST: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling accept$ax25: no syscalls can create resource sock_ax25, enable some syscalls that can create it [accept$ax25 accept4$ax25 syz_init_net_socket$ax25]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_AUTO_ASCONF: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PR_SUPPORTED: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RTOINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_DELAYED_SACK: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_HMAC_IDENT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_RESET_STREAMS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_ADD_STREAMS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_MAXSEG: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_DELAYED_SACK: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PRIMARY_ADDR: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_EVENTS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_MAXSEG: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling accept$alg: no syscalls can create resource sock_alg, enable some syscalls that can create it [socket$alg]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RESET_STREAMS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTH_CHUNK: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTH_CHUNK: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_RECVRCVINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_PR_SUPPORTED: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_MAXSEG: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_EVENTS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RECVNXTINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_RECVNXTINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling ioctl$sock_inet_sctp_SIOCINQ: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_NODELAY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_HMAC_IDENT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_RTOINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_CONTEXT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_EVENTS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_MAX_BURST: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RECVRCVINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_INITMSG: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_ASSOCINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_INITMSG: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTH_KEY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_PR_SUPPORTED: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_ASSOCINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RTOINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_DELAYED_SACK: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_DELAYED_SACK: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_ASSOCINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_HMAC_IDENT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTH_KEY: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RESET_ASSOC: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling sendmsg$inet_sctp: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_INITMSG: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_STATUS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTO_ASCONF: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling accept$unix: no syscalls can create resource sock_unix, enable some syscalls that can create it [accept$unix accept4$unix socket$unix socketpair$unix]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_AUTOCLOSE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling accept$ipx: no syscalls can create resource sock_ipx, enable some syscalls that can create it [accept$ipx accept4$ipx socket$ipx]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTO_ASCONF: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_EVENTS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PR_SUPPORTED: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_PRIMARY_ADDR: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling accept$netrom: no syscalls can create resource sock_netrom, enable some syscalls that can create it [accept$netrom accept4$netrom syz_init_net_socket$netrom]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_NODELAY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_NODELAY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RECVNXTINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_ASSOCINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_INITMSG: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_CONTEXT: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_CONTEXT: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling accept$nfc_llcp: no syscalls can create resource sock_nfc_llcp, enable some syscalls that can create it [accept$nfc_llcp accept4$nfc_llcp syz_init_net_socket$nfc_llcp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_AUTOCLOSE: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_RECVRCVINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling socket$inet_sctp: protocol not supported
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_AUTOCLOSE: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling accept$phonet_pipe: no syscalls can create resource sock_phonet_pipe, enable some syscalls that can create it [accept$phonet_pipe accept4$phonet_pipe socket$phonet_pipe]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_STATUS: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp_SCTP_MAX_BURST: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_MAX_BURST: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling setsockopt$inet_sctp6_SCTP_RECVRCVINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_RECVNXTINFO: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 disabling accept$packet: no syscalls can create resource sock_packet, enable some syscalls that can create it [accept$packet accept4$packet socket$packet]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS: no syscalls can create resource sock_sctp, enable some syscalls that can create it [socket$inet_sctp]
2021/05/11 10:27:58 disabling getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3: no syscalls can create resource sock_sctp6, enable some syscalls that can create it [socket$inet6_sctp]
2021/05/11 10:27:58 machine check:
2021/05/11 10:27:58 syscalls : 14/4148
2021/05/11 10:27:58 code coverage : enabled
2021/05/11 10:27:58 comparison tracing : enabled
2021/05/11 10:27:58 extra coverage : enabled
2021/05/11 10:27:58 setuid sandbox : enabled
2021/05/11 10:27:58 namespace sandbox : enabled
2021/05/11 10:27:58 Android sandbox : enabled
2021/05/11 10:27:58 fault injection : enabled
2021/05/11 10:27:58 leak checking : KMEMLEAK disabled: increase CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE or unset CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF
2021/05/11 10:27:58 net packet injection : enabled
2021/05/11 10:27:58 net device setup : enabled
2021/05/11 10:27:58 concurrency sanitizer : /sys/kernel/debug/kcsan does not exist
2021/05/11 10:27:58 devlink PCI setup : PCI device 0000:00:10.0 is not available
2021/05/11 10:27:58 USB emulation : /dev/raw-gadget does not exist
2021/05/11 10:27:58 hci packet injection : enabled
2021/05/11 10:27:58 wifi device emulation : /sys/class/mac80211_hwsim/ does not exist
2021/05/11 10:27:58 802.15.4 emulation : /sys/bus/platform/devices/mac802154_hwsim does not exist
2021/05/11 10:28:04 corpus : 0 (deleted 1523 broken)
2021/05/11 10:28:08 seeds : 0/683
2021/05/11 10:28:08 VMs 3, executed 0, cover 0, signal 0/0, crashes 0, repro 0
2021/05/11 10:28:18 VMs 3, executed 18, cover 0, signal 0/0, crashes 0, repro 0
2021/05/11 10:28:28 VMs 4, executed 56, cover 0, signal 0/0, crashes 0, repro 0
2021/05/11 10:28:38 VMs 4, executed 98, cover 0, signal 0/3797, crashes 0, repro 0
2021/05/11 10:28:48 VMs 5, executed 233, cover 0, signal 0/4208, crashes 0, repro 0
2021/05/11 10:29:49 VMs 8, executed 772, cover 147, signal 49/4745, crashes 0, repro 0
2021/05/11 10:29:59 VMs 8, executed 3106, cover 3147, signal 7697/10261, crashes 0, repro 0
2021/05/11 10:30:05 vm-2: crash: panic: disabled syscall
2021/05/11 10:30:05 failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f .]: fork/exec scripts/get_maintainer.pl: no such file or directory
2021/05/11 10:30:05 vm-0: running for 2m23.731641781s, restarting
2021/05/11 10:30:05 vm-1: running for 2m13.913911895s, restarting
2021/05/11 10:30:05 vm-3: running for 1m46.778878232s, restarting
2021/05/11 10:30:06 reproducing crash 'panic: disabled syscall': 754 programs, 4 VMs, timeouts [15s 1m40s 6m0s]
2021/05/11 10:30:09 VMs 4, executed 4312, cover 3366, signal 8084/10405, crashes 1, repro 1
2021/05/11 10:30:19 VMs 4, executed 4421, cover 3377, signal 8147/10428, crashes 1, repro 1
2021/05/11 10:30:29 VMs 4, executed 4782, cover 3377, signal 8151/10570, crashes 1, repro 1
log0

Dmitry Vyukov

unread,
May 17, 2021, 3:16:32 AM5/17/21
to Hangbin Liu, syzkaller
On Mon, May 17, 2021 at 3:16 AM Hangbin Liu <liuha...@gmail.com> wrote:
>
> On Mon, May 10, 2021 at 12:57:32PM +0200, Dmitry Vyukov wrote:
> > On Mon, May 10, 2021 at 9:28 AM Hangbin Liu <liuha...@gmail.com> wrote:
> > >
> > > On Mon, May 10, 2021 at 08:57:26AM +0200, Dmitry Vyukov wrote:
> > > > > > contents of the /syscalls manager page with the same config.
> > > > >
> > > > > What's this?
> > > >
> > > > Contents of http://0.0.0.0:56741/syscalls , or if you click "syscalls"
> > > > in the manager web ui.
> > >
> > > Ah, the test are automatized and the server has been released, I only saved the
> > > syz-manager-logs (defined in "workdir") and corpus.db. Does corpus.db helps?
> >
> >
> > I still have no clues.
> > Presumably the program was created by mutation. I stared at the code
> > more and I don't see how mutation can insert disabled syscalls.
> > I've also extended TestEnabledCalls and run it several thousand times.
> > I've created https://github.com/google/syzkaller/pull/2575 which may
> > or may not shed any light.
>
> Hi Dmitry,
>
> Here is last week's report, full log file attached. As the testing are automatic,



This one happened at a different stack:

panic: disabled syscall
goroutine 1 [running]:
main.(*Fuzzer).checkDisabledCalls(0xc00005c4e0, 0xc0067bdc40)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:485
+0x63a
main.(*Fuzzer).deserializeInput(0xc00005c4e0, 0xc0063fce00, 0x67,
0x67, 0x5de594e615eda2ea)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:463
+0x183
main.(*Fuzzer).addInputFromAnotherFuzzer(0xc00005c4e0, 0xc0066c9c10,
0xc, 0xc0063fce00, 0x67, 0x67, 0xc0067c8000, 0x3c8, 0x3c8,
0xc0066f4800, ...)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:428
+0x59
main.(*Fuzzer).poll(0xc00005c4e0, 0xc0066cb801, 0xc0066cb890, 0xa)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:406
+0x427
main.(*Fuzzer).pollLoop(0xc00005c4e0)
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:383
+0x3db
main.main()
/mnt/tests/kernel/networking/syzkaller/virtual/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:298
+0x16a0


I can see how this can happen at least potentially. I've sent
https://github.com/google/syzkaller/pull/2589 with a fix. Hard to say
if that's what happened or not.


> do you know how to get the /syscalls after testing?

The simplest would be to dump that info into the manager log (maybe at
verbosity=1). But I think I know what I will see there. E.g. in this
case "getuid" should be enabled as it's listed in your config, but not
listed in disabled calls in the manager log.


Btw, I noticed that you are trying to test SCTP based on
enable_syscalls, but all of them were disabled because
socket$inet_sctp and socket$inet6_sctp are not enabled.
I think you need to enable these as well. Otherwise what's tested is
just these syscalls:

check result for sandbox=namespace:
accept [0]
bind$netlink [62]
socket$nl_route [3697]
socket$inet6 [3666]
accept$inet [3]
socket$nl_generic [3694]
ioctl$sock_SIOCGIFINDEX [2135]
getgid [264]
getpid [283]
socket$inet [3665]
clock_gettime [129]
accept$inet6 [4]
bpf$MAP_CREATE [107]

Hangbin Liu

unread,
May 17, 2021, 4:01:22 AM5/17/21
to Dmitry Vyukov, syzkaller
On Mon, May 17, 2021 at 09:16:18AM +0200, Dmitry Vyukov wrote:
> I can see how this can happen at least potentially. I've sent
> https://github.com/google/syzkaller/pull/2589 with a fix. Hard to say
> if that's what happened or not.

Thanks for the works.

> > do you know how to get the /syscalls after testing?
>
> The simplest would be to dump that info into the manager log (maybe at
> verbosity=1). But I think I know what I will see there. E.g. in this
> case "getuid" should be enabled as it's listed in your config, but not
> listed in disabled calls in the manager log.
>
>
> Btw, I noticed that you are trying to test SCTP based on
> enable_syscalls, but all of them were disabled because
> socket$inet_sctp and socket$inet6_sctp are not enabled.
> I think you need to enable these as well. Otherwise what's tested is
> just these syscalls:

Yes, that's also what I want to ask. From the syzkaller-test.cfg you can see
I have enabled socket$inet_sctp and socket$inet6_sctp. But the log still
ask me to enable them...

Thanks
Hangbin

Dmitry Vyukov

unread,
May 17, 2021, 4:10:08 AM5/17/21
to Hangbin Liu, syzkaller
On Mon, May 17, 2021 at 10:01 AM Hangbin Liu <liuha...@gmail.com> wrote:
>
> On Mon, May 17, 2021 at 09:16:18AM +0200, Dmitry Vyukov wrote:
> > I can see how this can happen at least potentially. I've sent
> > https://github.com/google/syzkaller/pull/2589 with a fix. Hard to say
> > if that's what happened or not.
>
> Thanks for the works.
>
> > > do you know how to get the /syscalls after testing?
> >
> > The simplest would be to dump that info into the manager log (maybe at
> > verbosity=1). But I think I know what I will see there. E.g. in this
> > case "getuid" should be enabled as it's listed in your config, but not
> > listed in disabled calls in the manager log.
> >
> >
> > Btw, I noticed that you are trying to test SCTP based on
> > enable_syscalls, but all of them were disabled because
> > socket$inet_sctp and socket$inet6_sctp are not enabled.
> > I think you need to enable these as well. Otherwise what's tested is
> > just these syscalls:
>
> Yes, that's also what I want to ask. From the syzkaller-test.cfg you can see
> I have enabled socket$inet_sctp and socket$inet6_sctp. But the log still
> ask me to enable them...

Right, but see the log:

2021/05/11 10:27:58 disabling socket$inet_sctp: protocol not supported

socket(SCTP) returned ENOPROTO

Hangbin Liu

unread,
May 17, 2021, 4:57:00 AM5/17/21
to Dmitry Vyukov, syzkaller
On Mon, May 17, 2021 at 10:09:54AM +0200, Dmitry Vyukov wrote:
> Right, but see the log:
>
> 2021/05/11 10:27:58 disabling socket$inet_sctp: protocol not supported
>
> socket(SCTP) returned ENOPROTO

Ah, looks I forgot to modprobe sctp module..

Thanks
hangbin
Reply all
Reply to author
Forward
0 new messages